Desktop and mobile operating system fingerprinting based on IPv6 protocol using machine learning algorithms

被引:0
|
作者
Salah S. [1 ]
Abu Alhawa M. [1 ]
Zaghal R. [1 ]
机构
[1] Department of Computer Science, Al-Quds University, Jerusalem P.O. Box 20002, Palestine
来源
International Journal of Security and Networks | 2022年 / 17卷 / 01期
关键词
fingerprinting; IPv6; machine learning; mobile operating system; network security; operating system; performance measures;
D O I
10.1504/IJSN.2022.122543
中图分类号
学科分类号
摘要
Operating system (OS) fingerprinting tools are essential to network security because of their relationship to vulnerability scanning and penetrating testing. Although OS identification is traditionally performed by passive or active tools, more contributions have focused on IPv4 than IPv6. This paper proposes a new methodology based on machine learning algorithms to build classification models to identify IPv6 OS fingerprinting using a newly created dataset. Unlike other proposals that mainly depend on TCP and IP generic features; this work adds other features to improve the detection accuracy. It also considers OSes installed in mobiles (Android and iOS). The experimental results have shown that the algorithms achieved high and acceptable results in classifying OSes. KNN and DT achieved high accuracy of up to 99%. SVM and GNB achieved 81% and 75%, respectively. Moreover, KNN, RF and DT achieved the best recall, precision, and f-score with almost the same as the achieved accuracy. © 2022 Inderscience Enterprises Ltd.. All rights reserved.
引用
收藏
页码:1 / 12
页数:11
相关论文
共 50 条
  • [1] Operating System Fingerprinting Tool Based on Classical Machine Learning Algorithms
    Perez-Jove, Ruben
    Munteanu, Cristian R.
    Dorado, Julian
    Pazos, Alejandro
    Vazquez-Naya, Jose
    2023 JNIC CYBERSECURITY CONFERENCE, JNIC, 2023,
  • [2] Advanced Passive Operating System Fingerprinting Using Machine Learning and Deep Learning
    Hagos, Desta Haileselassie
    Loland, Martin
    Yazidi, Anis
    Kure, Oivind
    Engelstad, Paal E.
    2020 29TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2020), 2020,
  • [3] Machine Learning and Data Mining for IPv6 Network Defence
    Weisman, Michael
    Ritchey, P.
    Shearer, G.
    Colbert, E.
    Dauber, E.
    Knachel, L.
    Sullivan, D.
    Parker, T.
    Greenstadt, R.
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 681 - 688
  • [4] A novel IPv6 traceback architecture using COPS protocol
    Amin, Syed Obaid
    Siddiqui, Muhammad Shoaib
    Hong, Choong Seon
    ANNALS OF TELECOMMUNICATIONS, 2008, 63 (3-4) : 207 - 221
  • [5] A novel IPv6 traceback architecture using COPS protocol
    Syed Obaid Amin
    Muhammad Shoaib Siddiqui
    Choong Seon Hong
    annals of telecommunications - annales des télécommunications, 2008, 63 : 207 - 221
  • [6] Secure data communication using protocol steganography in IPv6
    Bobade, Sandip
    Goudar, Rajeshawari
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 275 - 279
  • [8] Analysis of operating system identification via fingerprinting and machine learning
    Song, Jinho
    Cho, ChaeHo
    Won, Yoojae
    COMPUTERS & ELECTRICAL ENGINEERING, 2019, 78 : 1 - 10
  • [9] IPv6 DoS Attacks Detection Using Machine Learning Enhanced IDS in SDN/NFV Environment
    Tseng, Chia-Wei
    Wu, Li-Fan
    Hsu, Shih-Chun
    Yu, Sheng-Wang
    APNOMS 2020: 2020 21ST ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2020, : 263 - 266
  • [10] Tracing the true source of an IPv6 datagram using policy based management system
    Amin, Syed Obaid
    Hong, Choong Seon
    Kim, Ki Young
    MANAGEMENT OF CONVERGENCE NETWORKS AND SERVICES, PROCEEDINGS, 2006, 4238 : 263 - 272